|
|
On this page we try to maintain a list of interesting webpages and books. If you have a suggestion or correction, please send it to the webmaster.
If you click on a book's title you will be taken to the
Amazon.com
website, where you can find more information and/or buy the book. Cryptix
receives a
small fee
for every book sold through a link on this webpage. Curious how we deal with
those Amazon cheques? Look here...
- AES Homepage
- The starting point for information on AES.
- Brian Gladman's Page on AES
- The fastest AES implementations in C/C++, including speed comparisons.
- Live from the Second AES Conference
- Long Dejanews thread about AES.
- MARS, RC6, Rijndael, Serpent, Twofish
- The AES candidate algorithms.
- Blowfish
- CAST, CAST5, CAST-128, CAST-256
- CRYPTON
- DEAL
- DFC
- DSA
- E2
- IDEA
- KEA
- LOKI97
- MARS
- MD2
- MD4
- MD5
- RC4
- RC5
- RC6
- RIPEMD-128, RIPEMD-160
- SHA-1
- SKIPJACK
- Square
- SRP
- Tiger
- TEA
- Twofish
- The Block Cipher Lounge
- Certicom's ECC Tutorials and Whitepapers
- Interesting set of tutorials for the ECC layman
- Elliptic Curves and Elliptic Functions
- Short introduction to Elliptic Curves
- IEEE P1363 Working Group
- P1363: Standard Specifications For Public Key Cryptography.
-
Elliptic Curve Public Key Cryptosystems
- This is likely to be the most traditional reference work on elliptic curve cryptography for its wide coverage of the subject, and as such could be compared to the role of Bruce Schneier's "Applied Cryptography" in general cryptography issues. (Alfred Menezes, Kluwer Academic Pub (1993), ISBN 0 792 39368 6)
-
Implementing Elliptic Curve Cryptography
- This book book reports on the author's experience in implementing a fairly complete EC library written in C, and is rated beginner to intermediate level -- a good place for a programmer to start studying ECC. (Michael Rosing, Manning Publications Company (1998), ISBN 1 884 77769 4)
-
Finite Fields
- Excellent book for anyone trying to understand and implement arithmetic over GF(q). (Rudolf Lidl & Harald Niederreiter, Cambridge University Press (1997), ISBN 0 521 39231 4.)
-
The Arithmetic of Elliptic Curves
- The main (if not the only one) reference book about critical aspects of elliptic curves as isogenies and the point-counting problem. (Joseph H. Silverman, Springer-Verlag (1986), ISBN 0 387 96203 4.)
- ASN.1 Information Site
- ASN.1 Information Site
- Selecting Cryptographic Key Sizes
- A model which determines
adequate key sizes
for all popular cryptosystems.
- RSA Labs' Crypto FAQ
- This FAQ covers the technical mathematics of cryptography as
well as export law and basic fundamentals of information security.
- Snake Oil Warning Signs: Encryption Software to Avoid
- It is difficult to distinguish bad crypto from the Real Thing: all encryption utilities produce garbled output. The purpose of this document is to present some simple "red flags" that can help you detect bad crypto.
- USENET sci.crypt FAQ
- Frequently Asked Questions (with answers) for the USENET sci.crypt newsgroup. Read this before you post.
- USENET sci.crypt.reasearch FAQ
- Frequently Asked Questions (with answers) for the USENET sci.crypt.research newsgroup. Read this before you post.
-
Applied Cryptography 2nd Edition [ Hardcover | Paperback ]
- Provides a comprehensive, up-to-date survey of modern cryptographic terms and techniques, along with practical advice on how to implement a wide variety of impenetrable encryptions, including algorithms and source code. (Bruce Schneier, John Wiley & Sons (October 1995), ISBN: 0471128457)
-
Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)
- If you are interested in the mathematics behind cryptography, this book is for you. It includes extensive exercises with each chapter and makes an ideal introduction for any math-literate person willing to get acquainted with this material.
(Douglas R. Stinson, CRC Press (March 1995), ISBN: 0849385210)
-
Handbook of Applied Cryptography [ Online version ]
- This book provides what is probably the best, up to date survey of the field of cryptography. The book is more academically rigourous than Bruce's Applied Cryptography but may be rather tough going for those wanting a more introductory book. (Alfred J. Menezes et al., CRC Press (October 1996), ISBN: 084938523)
-
The Codebreakers; The Comprehensive History of Secret Communication from Ancient Times to the Internet
- An updated and revised history of codes offers new information on techniques used to break machine and computer ciphers, as well as the speculation of scientists on how messages from outer space might be solved and a study of the use of codes during the Vietnam War. (David Kahn, Scribner (December 1996), ISBN: 0684831309)
- Jikes
- Fast, standards compliant, open source. The only decent Java
compiler in existence. Use it and you will never switch back to javac.
- Bert-Jaap Koops' Crypto Law Survey
- The survey of crypto regulations world-wide.
- Simone van der Hof's Digital Signature Law Survey
- The survey of digital signature regulations world-wide.
- cryptlib (C/C++)
- cryptlib is a powerful security toolkit which allows even inexperienced
crypto programmers to easily add encryption and authentication services to
their software. The high-level interface provides anyone with the ability to
add strong security capabilities to an application in as little as half an
hour, without needing to know any of the low-level details which make the
encryption or authentication work. Because of this, cryptlib dramatically
reduces the cost involved in adding security to new or existing applications.
- Cryptographic
Libraries: A comparison (outdated)
- IAIK (Java)
- OpenJCE
- OpenSSL (C/C++)
- The OpenSSL Project is a collaborative effort to develop a
robust, commercial-grade, full-featured, and Open Source toolkit
implementing the Secure Sockets Layer (SSL v2/v3) and Transport
Layer Security (TLS v1) protocols with full-strength cryptography
world-wide.
- PureTLS (Java)
- An SSL/TLS implementation in Java. Written in the US but some versions
are available from ftp://ftp.zedz.com/pub/crypto/crypto/LIBS/java/.
- Zedz Consultants: FTP Archive of Crypto Libraries
- Formerly Replay Associates, this archive contains copies of hundreds of
crypto libraries, tools and applications.
- International PGP Home Page
- Network Associates (formerly PGP Inc.)
- Network Associates International (formerly PGP International)
- RFC 2440: OpenPGP Message Format
- Updated version of RFC 2440
|
|